OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
☆14Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for juice-shop
Users that are interested in juice-shop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Feb 6, 2025Updated last year
- ☆29Jul 5, 2023Updated 2 years ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- ☆37Dec 3, 2024Updated last year
- ☆29Feb 13, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆59Apr 8, 2021Updated 5 years ago
- ☆51Apr 2, 2021Updated 5 years ago
- ☆46Oct 7, 2021Updated 4 years ago
- A quick bug bounty guide for beginners☆92May 3, 2025Updated 11 months ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 4 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆105Aug 17, 2021Updated 4 years ago
- Remote CLI tools at your fingertips☆103Jul 31, 2024Updated last year
- ☆113Apr 25, 2023Updated 2 years ago
- ☆668Oct 31, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automation of tokens/api keys testing.☆153Mar 28, 2023Updated 3 years ago
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆227Jul 24, 2025Updated 8 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆226Sep 25, 2025Updated 6 months ago
- Food or Item Order Management System☆329Nov 23, 2021Updated 4 years ago
- recon for bug hunters☆879Mar 5, 2026Updated last month
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,332Jan 10, 2025Updated last year
- DevBrute is a versatile password brute forcing tool designed to tackle a wide range of Social Media accounts and Web Applications. With i…☆233Feb 15, 2025Updated last year
- An hourly updated list of subdomains gathered from certificate transparency logs☆346Oct 13, 2021Updated 4 years ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆343Mar 26, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- this html file creates a csrf poc form to any http request.☆285Dec 14, 2022Updated 3 years ago
- The Bug Hunters Methodology☆4,273Aug 1, 2023Updated 2 years ago
- My Private Bug Hunting Methodology☆317Nov 27, 2024Updated last year
- Bug Bounty Tools used on Twitch - Recon☆321Sep 6, 2024Updated last year
- Bambdas collection for Burp Suite Professional and Community.☆514Mar 12, 2026Updated last month
- Now, the Host is Mine! - Super Fast Sub-domain Takeover Detection!☆385Jun 7, 2023Updated 2 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆456Apr 27, 2022Updated 3 years ago
- SQL Injection Vulnerability Scanner made with Python☆387Mar 11, 2025Updated last year
- ☆542Jun 26, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆501Jun 28, 2025Updated 9 months ago
- A modern tool written in Python that automates your xss findings.☆473Nov 26, 2023Updated 2 years ago
- List of Github repositories and articles with list of dorks for different search engines☆2,590Apr 11, 2025Updated last year
- Golden Guide☆518Jul 15, 2025Updated 9 months ago
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated 2 years ago
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests w…☆634Apr 5, 2026Updated 2 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆754Dec 19, 2023Updated 2 years ago